Home
last modified time | relevance | path

Searched refs:ciphertext (Results 1 – 25 of 37) sorted by relevance

12

/external/boringssl/src/ssl/test/runner/
Dkey_agreement.go104 if len(ckx.ciphertext) < 2 {
108 ciphertext := ckx.ciphertext
110 ciphertextLen := int(ckx.ciphertext[0])<<8 | int(ckx.ciphertext[1])
111 if ciphertextLen != len(ckx.ciphertext)-2 {
114 ciphertext = ckx.ciphertext[2:]
121 err = rsa.DecryptPKCS1v15SessionKey(config.rand(), key, ciphertext, preMasterSecret)
159 ckx.ciphertext = make([]byte, len(encrypted)+2)
160 ckx.ciphertext[0] = byte(len(encrypted) >> 8)
161 ckx.ciphertext[1] = byte(len(encrypted))
162 copy(ckx.ciphertext[2:], encrypted)
[all …]
Dchacha20_poly1305.go111 func (c *chaCha20Poly1305) poly1305(tag *[16]byte, nonce, ciphertext, additionalData []byte) {
112 input := make([]byte, 0, len(additionalData)+8+len(ciphertext)+8)
116 input = append(input, ciphertext...)
118 binary.LittleEndian.PutUint64(out, uint64(len(ciphertext)))
141 func (c *chaCha20Poly1305) Open(dst, nonce, ciphertext, additionalData []byte) ([]byte, error) {
145 if len(ciphertext) < 16 {
148 plaintextLen := len(ciphertext) - 16
151 c.poly1305(&tag, nonce, ciphertext[:plaintextLen], additionalData)
152 if subtle.ConstantTimeCompare(tag[:], ciphertext[plaintextLen:]) != 1 {
157 c.chaCha20(out, ciphertext[:plaintextLen], nonce, 1)
Dticket.go214 ciphertext := encrypted[aes.BlockSize : len(encrypted)-sha256.Size]
215 plaintext := make([]byte, len(ciphertext))
216 cipher.NewCTR(block, iv).XORKeyStream(plaintext, ciphertext)
Dhandshake_messages.go1195 ciphertext []byte member
1205 bytes.Equal(m.ciphertext, m1.ciphertext)
1212 length := len(m.ciphertext)
1218 copy(x[4:], m.ciphertext)
1233 m.ciphertext = data[4:]
/external/boringssl/src/crypto/modes/
Dgcm_test.c65 const char *ciphertext; member
316 *nonce = NULL, *ciphertext = NULL, *tag = NULL, *out = NULL; in run_test_case() local
327 !decode_hex(&ciphertext, &ciphertext_len, test->ciphertext, test_num, in run_test_case()
368 (ciphertext && memcmp(out, ciphertext, plaintext_len) != 0)) { in run_test_case()
371 hexdump("want", ciphertext, plaintext_len); in run_test_case()
380 if (ciphertext) { in run_test_case()
381 CRYPTO_gcm128_decrypt(&ctx, ciphertext, out, plaintext_len); in run_test_case()
399 OPENSSL_free(ciphertext); in run_test_case()
/external/boringssl/src/crypto/cipher/
Dcipher_test.cc110 const std::vector<uint8_t> &ciphertext, in TestOperation() argument
116 out = &ciphertext; in TestOperation()
118 in = &ciphertext; in TestOperation()
204 std::vector<uint8_t> key, iv, plaintext, ciphertext, aad, tag; in TestCipher() local
207 !t->GetBytes(&ciphertext, "Ciphertext")) { in TestCipher()
241 ciphertext, aad, tag)) { in TestCipher()
246 ciphertext, aad, tag)) { in TestCipher()
/external/openssh/openbsd-compat/
Dbcrypt_pbkdf.c71 u_int8_t ciphertext[BCRYPT_HASHSIZE] = in bcrypt_hash() local
89 cdata[i] = Blowfish_stream2word(ciphertext, sizeof(ciphertext), in bcrypt_hash()
103 explicit_bzero(ciphertext, sizeof(ciphertext)); in bcrypt_hash()
/external/srtp/srtp/
Dekt.c150 aes_decrypt_with_raw_key(void *ciphertext, const void *key) { in aes_decrypt_with_raw_key() argument
154 aes_decrypt(ciphertext, expanded_key); in aes_decrypt_with_raw_key()
/external/srtp/crypto/cipher/
Dcipher.c162 if (buffer[i] != test_case->ciphertext[i]) { in cipher_type_self_test()
174 octet_string_hex_string(test_case->ciphertext, in cipher_type_self_test()
199 buffer[i] = test_case->ciphertext[i]; in cipher_type_self_test()
/external/boringssl/src/crypto/cipher/test/
Dmake_legacy_aead_tests.go119 ciphertext []byte member
269 ciphertext: sealed[:len(sealed)-hash.Size()],
283 fmt.Printf("CT: %s\n", hex.EncodeToString(t.ciphertext))
Dcipher_test.txt59 # AES-bits-ECB:key::plaintext:ciphertext:encdec
105 # AES-bits-CBC:key:IV/ciphertext':plaintext:ciphertext:encdec
Drc4_sha1_tls_tests.txt4 # Note: aead_test's input format splits the ciphertext and tag positions of the sealed
Ddes_ede3_cbc_sha1_ssl3_tests.txt4 # Note: aead_test's input format splits the ciphertext and tag positions of the sealed
Drc4_md5_ssl3_tests.txt4 # Note: aead_test's input format splits the ciphertext and tag positions of the sealed
Daes_256_cbc_sha1_tls_implicit_iv_tests.txt4 # Note: aead_test's input format splits the ciphertext and tag positions of the sealed
Daes_128_cbc_sha1_tls_implicit_iv_tests.txt4 # Note: aead_test's input format splits the ciphertext and tag positions of the sealed
Drc4_sha1_ssl3_tests.txt4 # Note: aead_test's input format splits the ciphertext and tag positions of the sealed
Ddes_ede3_cbc_sha1_tls_implicit_iv_tests.txt4 # Note: aead_test's input format splits the ciphertext and tag positions of the sealed
Daes_128_cbc_sha1_ssl3_tests.txt4 # Note: aead_test's input format splits the ciphertext and tag positions of the sealed
Drc4_md5_tls_tests.txt4 # Note: aead_test's input format splits the ciphertext and tag positions of the sealed
/external/srtp/crypto/include/
Dcipher.h133 uint8_t *ciphertext; /* ciphertext */ member
/external/openssh/
DPROTOCOL.chacha20poly130564 bytes of ciphertext length have been received, they may be decrypted
72 ciphertext of the packet length and the payload together. The calculated
DPROTOCOL59 calculating the MAC over the packet ciphertext rather than the
61 protocol, where decryption of unauthenticated ciphertext provided a
66 to calculate the MAC over the packet ciphertext and to send the packet
/external/wpa_supplicant_8/src/crypto/
Dcrypto_module_tests.c418 char *ciphertext; in test_ecb() member
477 hexstr2bin(tv->ciphertext, cipher, sizeof(cipher))) { in test_ecb()
/external/libvncserver/libvncclient/
Drfbproto.c834 uint8_t userpass[128], ciphertext[128]; in HandleARDAuth() local
960 error = gcry_cipher_encrypt(aes, ciphertext, sizeof(ciphertext), userpass, sizeof(userpass)); in HandleARDAuth()
967 if (!WriteToRFBServer(client, (char *)ciphertext, sizeof(ciphertext))) in HandleARDAuth()

12